Sciweavers

6757 search results - page 1275 / 1352
» Knowledge Analysis on Process Models
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 1 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
DCOSS
2006
Springer
15 years 1 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li
USS
2008
15 years 4 days ago
Practical Symmetric Key Cryptography on Modern Graphics Hardware
Graphics processors are continuing their trend of vastly outperforming CPUs while becoming more general purpose. The latest generation of graphics processors have introduced the a...
Owen Harrison, John Waldron
COLING
2008
14 years 11 months ago
Verification and Implementation of Language-Based Deception Indicators in Civil and Criminal Narratives
Our goal is to use natural language processing to identify deceptive and nondeceptive passages in transcribed narratives. We begin by motivating an analysis of language-based dece...
Joan Bachenko, Eileen Fitzpatrick, Michael Schonwe...
MASCOTS
2010
14 years 11 months ago
Efficient Discovery of Loop Nests in Execution Traces
Execution and communication traces are central to performance modeling and analysis. Since the traces can be very long, meaningful compression and extraction of representative beha...
Qiang Xu, Jaspal Subhlok, Nathaniel Hammen
« Prev « First page 1275 / 1352 Last » Next »